


default search action
Security and Communication Networks, Volume 2021
Volume 2021, 2021
- Changguang Wang

, Ziqiu Zhao, Fangwei Wang
, Qingru Li
:
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet. 6658842:1-6658842:16 - Zhifei Wang

, Gang Xu
, Na Zhang, Zhihan Qi, Fengqi Wei, Liqiang He:
Ferry Node Identification Model for the Security of Mobile Ad Hoc Network. 6682311:1-6682311:13 - Hui Li, Limin Shen

, Yuying Wang, Jiayin Feng, Honglei Tan, Zhiming Li:
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination. 8814844:1-8814844:18 - Xin Li

, Peng Yi
, Wei Wei, Yiming Jiang, Le Tian
:
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection. 8830431:1-8830431:22 - Yawei Yue, Shancang Li

, Phil Legg
, Fuzhong Li
:
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. 8873195:1-8873195:13 - Shichang Ding

, Fan Zhao
, Xiangyang Luo
:
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers. 6658642:1-6658642:11 - Tao Feng, Xusheng Wang

, Chunyan Liu, Junli Fang:
Secure Data Collaborative Computing Scheme Based on Blockchain. 6630291:1-6630291:9 - Menghui Lou

, Xiaolei Dong
, Zhenfu Cao
, Jiachen Shen
:
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. 8884478:1-8884478:18 - Khalid M. Al-Gethami

, Mousa T. Al-Akhras
, Mohammed Alawairdhi
:
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets. 8836057:1-8836057:28 - Youxia Dong, Xiaoling Huang

, Qixiang Mei, Yuanju Gan:
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map. 6674948:1-6674948:12 - Yajing Hao, Xinrong Yan, Jianbin Wu

, Huijun Wang, Linfeng Yuan:
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association. 6628034:1-6628034:12 - (Withdrawn) Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network. 6644107:1-6644107:12

- Juhong Namgung, Siwoon Son

, Yang-Sae Moon
:
Efficient Deep Learning Models for DGA Domain Detection. 8887881:1-8887881:15 - Zhenwei Chen

, Axin Wu
, Yifei Li
, Qixuan Xing
, Shengling Geng
:
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing. 6619689:1-6619689:11 - Tao Zhang

, Xiongfei Song
, Lele Zheng, Yani Han, Kai Zhang
, Qi Li:
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing. 6679157:1-6679157:14 - Sivleen Kaur, Sheetal Chaturvedi, Aabha Sharma, Jayaprakash Kar

:
A Research Survey on Applications of Consensus Protocols in Blockchain. 6693731:1-6693731:22 - Zhengguo Wu, Kai Zhang, Yannan Ren, Jing Li, Jiande Sun, Wenbo Wan

:
Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. 6675354:1-6675354:16 - Suleyman Alterkavi

, Hasan Erbay
:
Design and Analysis of a Novel Authorship Verification Framework for Hijacked Social Media Accounts Compromised by a Human. 8869681:1-8869681:12 - Chongzhen Zhang, Yanli Chen, Yang Meng, Fangming Ruan

, Runze Chen, Yidan Li, Yaru Yang:
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques. 6610675:1-6610675:15 - Jiasheng Qu, Wei Song

, Xiangchun Liu, Lizhi Zhao, Xiaobing Zhao:
A Novel Improved Reversible Visible Image Watermarking Algorithm Based on Grad-CAM and JND. 6652897:1-6652897:17 - Tao Wang

, Hongchang Chen:
A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies. 6688489:1-6688489:23 - Xiaokang Xiong

, Yuhang Dai
, Zhuhua Hu
, Kejia Huo
, Yong Bai
, Hui Li
, Dake Liu
:
Hardware Sharing for Channel Interleavers in 5G NR Standard. 8872140:1-8872140:13 - Diqun Yan

, Mingyu Dong, Jinxing Gao:
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency. 6659371:1-6659371:6 - Shiyue Qin

, Zhenhua Tan
, Fucai Zhou
, Jian Xu
, Zongye Zhang:
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks. 6629726:1-6629726:14 - Lei Du, Songsong Dai

, Haifeng Song
, Yuelong Chuang, Yingying Xu:
Weighted Nuclear Norm Minimization on Multimodality Clustering. 6662989:1-6662989:7 - Zixuan Shen

, Zhihua Xia
, Peipeng Yu
:
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation. 6684179:1-6684179:13 - Shengxu Xie

, Chang-you Xing
, Guomin Zhang
, Jinlong Zhao
:
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks. 6667922:1-6667922:16 - Parimah Ziayi, Seyed Mostafa Farmanbar, Mohsen Rezvani

:
YAICD: Yet Another IMSI Catcher Detector in GSM. 8847803:1-8847803:13 - Chuqiao Xiao

, Xueqing Gong
, Yefeng Xia
, Qian Zhang
:
PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w. 6642121:1-6642121:18 - Asad Ullah, Jing Wang

, Muhammad Shahid Anwar
, Arshad Ahmad
, Shah Nazir
, Habib Ullah Khan
, Zesong Fei:
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition. 6673992:1-6673992:12 - Suliman A. Alsuhibany

:
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack. 6653076:1-6653076:11 - Rahul Johari

, Sawan Kalra
, Sonika Dahiya
, Kalpana Gupta
:
S2NOW: Secure Social Network Ontology Using WhatsApp. 7940103:1-7940103:21 - Tsu-Yang Wu

, Tao Wang
, Yu-Qi Lee
, Weimin Zheng
, Saru Kumari
, Sachin Kumar
:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. 6658041:1-6658041:16 - Zhe Ren

, Xinghua Li
, Qi Jiang
, Qingfeng Cheng
, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. 6694058:1-6694058:19 - Kaiqing Huang

, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. 8872699:1-8872699:22 - Fei Zhang

, Aisuo Jin, Yin Hu:
Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction. 6631196:1-6631196:9 - Sooyong Jeong

, Cheolhee Park
, Dowon Hong
, Changho Seo
, Nam-Su Jho
:
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. 6680782:1-6680782:12 - Jingwei Wang

, Xinchun Yin
, Jianting Ning:
Fine-Grained Task Access Control System for Mobile Crowdsensing. 6682456:1-6682456:13 - Jie Zeng, Chunhua Wang

:
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata. 6675565:1-6675565:15 - Mansoor Fateh

, Mohsen Rezvani
, Yasser Irani
:
A New Method of Coding for Steganography Based on LSB Matching Revisited. 6610678:1-6610678:15 - Zhongguo Yang

, Irshad Ahmed Abbasi
, Elfatih Elmubarak Mustafa
, Sikandar Ali
, Mingzhu Zhang:
An Anomaly Detection Algorithm Selection Service for IoT Stream Data Based on Tsfresh Tool and Genetic Algorithm. 6677027:1-6677027:10 - Juan Tang

, Hualu Xu
, Pengsen Cheng
, Jiayong Liu
, Cheng Huang
, Xun Tang
:
Zombie Follower Recognition Based on Industrial Chain Feature Analysis. 6656470:1-6656470:12 - (Withdrawn) Network Teaching Technology Based on Big Data Mining and Information Fusion. 6629563:1-6629563:9

- Yuqing Zhong

, Zhaohua Li
, Liping Liao
:
A Privacy-Preserving Caching Scheme for Device-to-Device Communications. 6696149:1-6696149:8 - Hongwei Luo

, Yijie Shen
, Feng Lin
, Guoai Xu
:
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference. 6664578:1-6664578:10 - Jonathan Jen-Rong Chen, Yi-Yuan Chiang, Wang-Hsin Hsu, Wen-Yen Lin

:
Fail-Stop Group Signature Scheme. 6693726:1-6693726:6 - Iram Javed

, Xianlun Tang, Kamran Shaukat
, Muhammad Umer Sarwar, Talha Mahboob Alam
, Ibrahim A. Hameed
, Muhammad Asim Saleem
:
V2X-Based Mobile Localization in 3D Wireless Sensor Network. 6677896:1-6677896:13 - Xinzhi Feng

, Yang Yang
, Xiaozhong Qi, Chunming Xu, Ze Ji
:
Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events. 6643034:1-6643034:14 - Zishuai Cheng

, Baojiang Cui
, Tao Qi
, Wenchuan Yang
, Junsong Fu
:
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure. 6661124:1-6661124:11 - Yi-Fan Tseng, Zi-Yuan Liu

, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. 6678194:1-6678194:12 - Zhonghua Wang

, Siwei Duan, Chengli Sun:
Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy. 6661852:1-6661852:10 - Jinxiong Zhao

, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang, Dejun Mu:
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective. 6699108:1-6699108:14 - Zitian Liao

, Shah Nazir
, Habib Ullah Khan
, Muhammad Shafiq
:
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions. 6677867:1-6677867:22 - Xin Tang

, Linna Zhou
, Bingwei Hu
, Haowen Wu
:
Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack. 6686281:1-6686281:15 - Daiki Yamakawa

, Takashi Okimoto
, Songpon Teerakanok
, Atsuo Inomata
, Tetsutaro Uehara
:
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. 6610863:1-6610863:14 - Shuaijianni Xu

:
An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation. 6612614:1-6612614:18 - Aodi Liu

, Xuehui Du
, Na Wang
:
Efficient Access Control Permission Decision Engine Based on Machine Learning. 3970485:1-3970485:11 - Maria Azees

, Pandi Vijayakumar
, Lazarus Jegatha Deborah
, Marimuthu Karuppiah
, Mary Subaja Christo
:
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs. 6679882:1-6679882:11 - (Withdrawn) Statistical Modeling and Simulation of Online Shopping Customer Loyalty Based on Machine Learning and Big Data Analysis. 5545827:1-5545827:12

- Daoqi Han

, Songqi Wu, Zhuoer Hu, Hui Gao, Enjie Liu, Yueming Lu
:
A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks. 6671132:1-6671132:11 - Yan Wang, Jixin Li, Wansheng Liu, Aiping Tan

:
Efficient Concurrent Execution of Smart Contracts in Blockchain Sharding. 6688168:1-6688168:15 - (Withdrawn) Research on Digital Economy and Human Resources Based on Fuzzy Clustering and Edge Computing. 5583967:1-5583967:8

- Lejun Gong

, Xingxing Zhang, Tianyin Chen, Li Zhang:
Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms. 6635027:1-6635027:8 - Youxia Dong, Xiaoling Huang

, Guodong Ye
:
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. 6677325:1-6677325:16 - (Withdrawn) Research on Accounting Intelligence System Modeling of Financial Performance Evaluation. 5550382:1-5550382:9

- Deepak Prashar, Nishant Jha

, Muhammad Shafiq
, Nazir Ahmad, Mamoon Rashid
, Shoeib Amin Banday, Habib Ullah Khan
:
Blockchain-Based Automated System for Identification and Storage of Networks. 6694281:1-6694281:7 - Li-Hua Gong, Jin Du, Jing Wan, Nan-Run Zhou

:
Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation. 6627005:1-6627005:16 - Bingbing Jiang

:
Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys. 6695304:1-6695304:7 - Hongtao Li

, Feng Guo
, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu:
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data. 6623639:1-6623639:10 - Ping Yu

, Wei Ni, Guangsheng Yu, Hua Zhang
, Ren Ping Liu, Qiaoyan Wen
:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. 6638453:1-6638453:14 - Li Miao

, Shuai Li:
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT. 8896715:1-8896715:11 - Fengyin Li

, Pei Ren
, Guoyu Yang
, Yuhong Sun
, Yilei Wang
, Yanli Wang
, Siyuan Li
, Huiyu Zhou
:
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. 6670847:1-6670847:16 - Lee Mariel Heucheun Yepdia

, Alain Tiedeu
, Guillaume Kom
:
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique. 6615708:1-6615708:17 - Jia Fan, Lanfei Qiao

, Yunfei Cao, Shanglin Liu, Wenke Zhang, Lin Tang:
A New Password- and Position-Based Authenticated Key Exchange. 6613392:1-6613392:9 - Tsu-Yang Wu

, Lei Yang
, Zhiyuan Lee
, Chien-Ming Chen
, Jeng-Shyang Pan
, SK Hafizul Islam
:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. 6627956:1-6627956:14 - Junyi He, Junnan Zhang

, Cheng Song
, Mengxiang Wu
:
Spectral Efficiency of the Multiway Massive System over Rician Fading Channels. 6618363:1-6618363:8 - Binjie Chen

, Fushan Wei
, Chunxiang Gu
:
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms. 6643763:1-6643763:10 - Ahmad Alanezi

, Bassem Abd-El-Atty
, Hoshang Kolivand
, Ahmed A. Abd El-Latif
, Basma Abd El-Rahiem
, Syam Sankar, Hany S. Khalifa
:
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. 6615512:1-6615512:17 - Jie Ling

, Junwei Chen
, Jiahui Chen
, Wensheng Gan
:
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating. 6661450:1-6661450:13 - Wenyan Pan

, Meimin Wang
, Jiaohua Qin
, Zhili Zhou
:
Improved CNN-Based Hashing for Encrypted Image Retrieval. 5556634:1-5556634:8 - Songjie Wei

, Zedong Zhang, Shasha Li, Pengfei Jiang:
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection. 6695858:1-6695858:10 - Jiawei Zhang

, Jianfeng Ma, Teng Li
, Qi Jiang
:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. 6646445:1-6646445:17 - Mengmeng Cui

, Yiming Fei
, Yin Liu
:
A Survey on Secure Deployment of Mobile Services in Edge Computing. 8846239:1-8846239:8 - Teng Li

, Jiawei Zhang
, Yangxu Lin, Shengkai Zhang, Jianfeng Ma:
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things. 6689448:1-6689448:13 - Yuting Li

, Qingfeng Cheng
, Wenbo Shi:
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. 5573886:1-5573886:6 - Hira Nazir

, Imran Sarwar Bajwa
, Muhammad Samiullah
, Waheed Anwar
, Muhammad Moosa
:
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm. 6617944:1-6617944:17 - (Withdrawn) Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology. 5549309:1-5549309:9

- (Withdrawn) Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence. 6648257:1-6648257:8

- Yidong Yuan, Yao Zhang

, Yiqiang Zhao, Xige Zhang, Ming Tang
:
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel. 8839222:1-8839222:15 - Jiantao Shi

, Xiangzhan Yu
, Zechao Liu
:
Nowhere to Hide: A Novel Private Protocol Identification Algorithm. 6672911:1-6672911:10 - Wenfa Qi

, Yuxin Liu
, Sirui Guo
, Xiang Wang
, Zongming Guo
:
An Adaptive Visible Watermark Embedding Method based on Region Selection. 6693343:1-6693343:11 - Peijun Zhang

, Lianhai Wang
, Wei Wang
, Kunlun Fu
, Jinpeng Wang
:
A Blockchain System Based on Quantum-Resistant Digital Signature. 6671648:1-6671648:13 - Tongchen Shen

, Fuqun Wang
, Kefei Chen, Zhonghua Shen, Renjun Zhang:
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption. 6619476:1-6619476:14 - Wei Yang

, Anni Jia:
Side-Channel Leakage Detection with One-Way Analysis of Variance. 6614702:1-6614702:13 - (Withdrawn) Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision. 5511252:1-5511252:6

- Jianan Zhao

, Ruwei Huang
, Bo Yang
:
Efficient GSW-Style Fully Homomorphic Encryption over the Integers. 8823787:1-8823787:13 - (Withdrawn) An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm. 5533376:1-5533376:8

- Chirag Sharma

, Bagga Amandeep
, Rajeev Sobti
, Tarun Kumar Lohani
, Mohammad Shabaz
:
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption. 5536170:1-5536170:19 - Pengcheng He

, Kehui Sun
, Congxu Zhu
:
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture. 6679288:1-6679288:16 - Jie Yang

, Xinsheng Ji, Kaizhi Huang
, Xiaoli Sun, Yi Wang:
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface. 8836757:1-8836757:12 - Yihang Song

, Songfan Li
, Chong Zhang
, Li Lu
:
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme. 6668498:1-6668498:15 - Yuanju Gan

:
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology. 6697295:1-6697295:11 - Yang Qiao

, Yunjie Tian
, Yue Liu
, Jianbin Jiao
:
Genetic Feature Fusion for Object Skeleton Detection. 6621760:1-6621760:9 - (Withdrawn) Research on the Credibility of Social Media Information Based on User Perception. 5567610:1-5567610:10

- Yunzhe Tian

, Jiqiang Liu
, Endong Tong
, Wenjia Niu
, Liang Chang
, Qi Alfred Chen
, Gang Li
, Wei Wang
:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. 6631247:1-6631247:13 - Zhongguo Yang

, Irshad Ahmed Abbasi
, Fahad Algarni
, Sikandar Ali
, Mingzhu Zhang:
An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding. 5537041:1-5537041:11 - Ricardo Ávila

, Raphaël Khoury
, Richard Khoury
, Fábio Petrillo
:
Use of Security Logs for Data Leak Detection: A Systematic Literature Review. 6615899:1-6615899:29 - Zhen Zhang

, Bing Guo, Yan Shen, Chengjie Li
, Xinhua Suo, Hong Su
:
Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. 6629433:1-6629433:11 - Muhua Liu

, Lin Wang
, Qingtao Wu
, Jianqiang Song
:
Distributed Functional Signature with Function Privacy and Its Application. 6699974:1-6699974:14 - Wenfeng Xu

, Yongxian Fan
, Changyong Li
:
I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree. 5564354:1-5564354:9 - Qun Wang, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, Chao Hu

:
A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols. 6690988:1-6690988:11 - Elmustafa Sayed Ali

, Mohammad Kamrul Hasan
, Rosilah Hassan
, Rashid A. Saeed
, Mona Bakri Hassan, Shayla Islam, Nazmus Shaker Nafi, Savitri Bevinakoppa:
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications. 8868355:1-8868355:23 - Fei Zhao

, Yang Xin
, Kai Zhang, Xinxin Niu:
Representativeness-Based Instance Selection for Intrusion Detection. 6638134:1-6638134:13 - Hui Liu, Hanxing Xue, Hui Lu:

A Sensitive File Abnormal Access Detection Method Based on Application Classification. 6684456:1-6684456:7 - Rahma Gantassi

, Bechir Ben Gouissem, Omar Cheikhrouhou
, Salim El Khediri
, Salem Hasnaoui:
Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning. 5531185:1-5531185:12 - (Withdrawn) Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks. 5538720:1-5538720:14

- Chengtang Cao, Lin You

, Gengran Hu:
Fuzzy Identity-Based Ring Signature from Lattices. 6692608:1-6692608:9 - Shubao Pan, Binyi Qin

, Lvqing Bi, Jincun Zheng, Ruizhao Yang, Xiaofeng Yang, Yun Li
, Zhi Li:
An Unsupervised Learning Method for the Detection of Genetically Modified Crops Based on Terahertz Spectral Data Analysis. 5516253:1-5516253:7 - Yuting Du

, Tong Qiao
, Ming Xu
, Ning Zheng
:
Towards Face Presentation Attack Detection Based on Residual Color Texture Representation. 6652727:1-6652727:16 - Jiarui Man, Guozi Sun

:
A Residual Learning-Based Network Intrusion Detection System. 5593435:1-5593435:9 - Wenbing Wang

, Yan Li
, Shengli Liu:
A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination. 6615678:1-6615678:13 - Yan Li

, Yifei Lu
:
ETCC: Encrypted Two-Label Classification Using CNN. 6633250:1-6633250:11 - Hongkun Zhang

, Xinmin Liu:
Reverse Auction-Based Services Optimization in Cloud Computing Environments. 6666628:1-6666628:10 - Huan Zhang

, Jiliu Zhou
, Dongrui Gao
, Xinguo Wang
, Zhefan Chen, Hongyu Wang
:
Hardware Trojan Detection Based on Ordered Mixed Feature GEP. 6682674:1-6682674:9 - Yanfeng Shi

, Shuo Qiu
:
Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT. 5595243:1-5595243:11 - Quanzhong Li

, Sai Zhao
:
Robust Secure Beamforming Design for Cooperative Cognitive Radio Nonorthogonal Multiple Access Networks. 5526485:1-5526485:9 - Amjad Khan, Asfandyar Khan, Javed Iqbal Bangash

, Fazli Subhan
, Abdullah Khan
, Atif Khan
, Muhammad Irfan Uddin
, Marwan Mahmoud
:
Cuckoo Search-based SVM (CS-SVM) Model for Real-Time Indoor Position Estimation in IoT Networks. 6654926:1-6654926:7 - Jin Li, Songqi Wu, Yundan Yang, Fenghui Duan, Hui Lu

, Yueming Lu
:
Controlled Sharing Mechanism of Data Based on the Consortium Blockchain. 5523489:1-5523489:10 - Md Iman Ali

, Sukhkirandeep Kaur
:
Next-Generation Digital Forensic Readiness BYOD Framework. 6664426:1-6664426:19 - Hassan Mahmood, Danish Mahmood

, Qaisar Shaheen
, Rizwan Akhtar, Wang Changda
:
S-DPS: An SDN-Based DDoS Protection System for Smart Grids. 6629098:1-6629098:19 - Runnan Zhang

, Gang Liu
, Shancang Li
, Yongheng Wei
, Quan Wang
:
ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities. 5531369:1-5531369:11 - Zhijun Wu

, Yue Yin
, Guang Li
, Meng Yue
:
Coherent Detection of Synchronous Low-Rate DoS Attacks. 6694264:1-6694264:14 - Ming Zhong

, Yajin Zhou, Gang Chen:
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network. 5542543:1-5542543:13 - (Withdrawn) Research on Sports Training Decision Support System Based on Improved Association Rules Algorithm. 5561970:1-5561970:6

- Huimin Wang

, Dong Zheng
, Qinglan Zhao
:
Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain. 6632518:1-6632518:12 - (Withdrawn) Research on English Movie Resource Information Mining Based on Dynamic Data Stream Classification. 5518913:1-5518913:10

- YuFan Cai

, Yanyan Zhang
, Chengsheng Pan
:
Lane Detection Based on Adaptive Network of Receptive Field. 6618459:1-6618459:13 - Ihsan Ullah

, Muhammad Sajjad Khan
, Marc St-Hilaire
, Mohammad Faisal
, Junsu Kim
, Su Min Kim
:
Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters. 5541974:1-5541974:10 - Qiong Li, Liqiang Zhang, Rui Zhou, Yaowen Xia, Wenfeng Gao

, Yonghang Tai
:
Machine Learning-Based Stealing Attack of the Temperature Monitoring System for the Energy Internet of Things. 6661954:1-6661954:8 - Hao Zou

, Pengpeng Yang
, Rongrong Ni
, Yao Zhao
:
Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network. 6663486:1-6663486:8 - Yu Weng

, Haozhen Chu
, Zhaoyi Shi
:
An Intelligent Offloading System Based on Multiagent Reinforcement Learning. 8830879:1-8830879:13 - Rabiya Ghafoor, Danish Saleem, Sajjad Shaukat Jamal

, Muhammad Ishtiaq
, Sadaf Ejaz, Arif Jamal Malik, Muhammad Fahad Khan
:
Survey on Reversible Watermarking Techniques of Echocardiography. 8820082:1-8820082:19 - Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung Wang

:
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains. 6637402:1-6637402:13 - D. J. Guan, X. Y. Qian, S. X. Lu, N. An, Peng Ye

, M. L. Zhang, N. Zhang:
Research on Coordinated Scheduling Strategy of Heat Storage Thermoelectric Units Based on Wind Power Data Acquisition System Using Edge Computing. 8864552:1-8864552:11 - Franklin Leukam Lako

, Paul Lajoie-Mazenc
, Maryline Laurent
:
Privacy-Preserving Publication of Time-Series Data in Smart Grid. 6643566:1-6643566:21 - Shanshan Shi

, Ting Luo
, Jiangtao Huang
, Meng Du
:
A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform. 6662700:1-6662700:12 - Mingshu He

, Xiaojuan Wang
, Junhua Zhou
, Yuanyuan Xi
, Lei Jin
, Xinlei Wang
:
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection. 6659022:1-6659022:13 - Qi Tao

, Q. Chen, Hongwei Ding
, Adnan Iftekhar, Xiaofang Huang, Xiaohui Cui
:
Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme. 6668339:1-6668339:18 - Sandi Rahmadika

, Muhammad Firdaus
, Seolah Jang
, Kyung-Hyune Rhee
:
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach. 5550153:1-5550153:14 - Jun Ma

, Minshen Wang
, Jinbo Xiong
, Yongjin Hu
:
CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. 8855341:1-8855341:14 - Haseeb Tariq, Muhammad Kashif Hanif

, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei
:
Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem. 5587511:1-5587511:10 - Elmahdi Bentafat

, M. Mazhar Rathore
, Spiridon Bakiras
:
Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks. 6619770:1-6619770:16 - (Withdrawn) Research on Optimal Design of Short-Life Cycle Product Logistics Supply Chain Based on Multicriteria Decision Model. 5564831:1-5564831:12

- Wenjuan Li

, Shihua Cao
, Keyong Hu
, Jian Cao
, Rajkumar Buyya
:
Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm. 5563312:1-5563312:18 - Fuyou Miao, Yue Yu, Keju Meng

, Yan Xiong, Chin-Chen Chang:
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. 6678345:1-6678345:9 - Xiao Jiang

, Peng Li
, Bin Li, Yulong Zou
, Ruchuan Wang:
Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications. 5599334:1-5599334:16 - (Withdrawn) Neural Reversible Steganography with Long Short-Term Memory. 5580272:1-5580272:14

- Ruijie Pan, Gaocai Wang

, Man Wu:
An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence. 5582921:1-5582921:12 - Weina Niu

, Jiao Xie
, Xiaosong Zhang
, Chong Wang
, Xin-Qiang Li
, Ruidong Chen
, Xiao-Lei Liu
:
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis. 6653386:1-6653386:12 - (Withdrawn) Research on Sports Balanced Development Evaluation System Based on Edge Computing and Balanced Game. 5557138:1-5557138:8

- Yinghua Tian

, Nae Zheng
, Xiang Chen
, Liuyang Gao
:
Wasserstein Metric-Based Location Spoofing Attack Detection in WiFi Positioning Systems. 8817569:1-8817569:12 - Guangxia Xu

, Daiqi Zhou
, Jun Liu
:
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention. 5567991:1-5567991:11 - Dapeng Lang

, Deyun Chen
, Ran Shi
, Yongjun He
:
Attention-Guided Digital Adversarial Patches on Visual Detection. 6637936:1-6637936:11 - (Withdrawn) Theory and Application of Weak Signal Detection Based on Stochastic Resonance Mechanism. 5553490:1-5553490:9

- Yiou Wang, Fuquan Zhang

, Junfeng Wang, Laiyang Liu, Bo Wang:
A Bibliometric Analysis of Edge Computing for Internet of Things. 5563868:1-5563868:10 - Zhuo Liu

, Yong Wang
, Leo Yu Zhang
, Jun Ma
:
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model. 6625579:1-6625579:21 - (Withdrawn) DDoS Detection Using a Cloud-Edge Collaboration Method Based on Entropy-Measuring SOM and KD-Tree in SDN. 5594468:1-5594468:16

- Jie Wang

, Feng Wang
, Hongtao Li
:
Differential Privacy Location Protection Scheme Based on Hilbert Curve. 5574415:1-5574415:12 - Liyun Dou

, Zichi Wang
, Zhenxing Qian
, Guorui Feng
:
Reversible Privacy Protection with the Capability of Antiforensics. 5558873:1-5558873:12 - Wenhua Gao

, Li Yang
:
Quantum Election Protocol Based on Quantum Public Key Cryptosystem. 5551249:1-5551249:15 - Tidiane Sylla

, Mohamed Aymen Chalouf
, Francine Krief
, Karim Samaké:
SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things. 6632747:1-6632747:24 - (Withdrawn) An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm. 5510481:1-5510481:11

- Xiushan Liu

, Chun Shan
, Qin Zhang
, Jun Cheng
, Peng Xu
:
Compressed Wavelet Tensor Attention Capsule Network. 9949204:1-9949204:12 - Yao Du, Mengtian Cui

, Xiaochun Cheng
:
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining. 5593178:1-5593178:11 - Yurong Luo

, Hui Li, Ruhui Ma
, Zhenyang Guo
:
A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services. 6697155:1-6697155:18 - Peisong He

, Hongxia Wang, Ruimei Zhang
, Yue Li
:
A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency. 5568351:1-5568351:14 - Ahmed I. Iskanderani, Ibrahim Mustafa Mehedi, Abdulah Jeza Aljohani, Mohammad Shorfuzzaman, Farzana Akther, Thangam Palaniswamy, Shaikh Abdul Latif, Abdul Latif:

Artificial Intelligence-Based Digital Image Steganalysis. 9923389:1-9923389:9 - Mengting Yao

, Xiaoming Wang
, Qingqing Gan
, Yijian Lin
, Chengpeng Huang
:
An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs. 6698099:1-6698099:12 - Jian Zhou

, Xiaotian Gong, Lijuan Sun
, Yong Xie, Xiaoyong Yan:
Adaptive Routing Strategy Based on Improved Double Q-Learning for Satellite Internet of Things. 5530023:1-5530023:11 - Riguang Lin, Sheng Li

:
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm. 5586959:1-5586959:18 - Yun Tan

, Jiaohua Qin
, Xuyu Xiang
, Chunhu Zhang
, Zhangdong Wang
:
Coverless Steganography Based on Motion Analysis of Video. 5554058:1-5554058:16 - Mohammad Sirajuddin, Ch. Rupa

, Celestine Iwendi
, Cresantus N. Biamba
:
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network. 5521713:1-5521713:9 - Sa Math

, Prohim Tam
, Seokhoon Kim
:
Intelligent Media Forensics and Traffic Handling Scheme in 5G Edge Networks. 5589352:1-5589352:11 - Qi Han

, Hao Chen, Liyang Yu, Qiong Li:
Robust Frame Duplication Detection for Degraded Videos. 6616239:1-6616239:13 - Xiang Cheng

, Qian Luo, Ye Pan, Zitong Li, Jiale Zhang, Bing Chen
:
Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning. 8814068:1-8814068:14 - Ruhi Tas

, Ömer Özgür Tanriöver
:
A Manipulation Prevention Model for Blockchain-Based E-Voting Systems. 6673691:1-6673691:16 - Dong Zhang

, Zhongyi Guo
:
Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection. 6612438:1-6612438:16 - Wenju Xu

, Baocang Wang
, Rongxing Lu
, Quanbo Qu
, Yange Chen
, Yupu Hu
:
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials. 5553256:1-5553256:14 - Qingqing Xie

, Fan Dong
, Xia Feng
:
ECLB: Edge-Computing-Based Lightweight Blockchain Framework for Mobile Systems. 5510586:1-5510586:15 - Kun Niu

, Changgen Peng
, Weijie Tan
, Zhou Zhou, Yi Xu:
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing. 6654539:1-6654539:11 - Jianglong Yang

, Wanlin Yang
, Huwei Liu
, Li Zhou
:
Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network. 5577514:1-5577514:18 - Zuowen Tan, Haohan Zhang

, Peiyi Hu, Rui Gao:
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties. 8876893:1-8876893:16 - Gaopeng Xie, Yuling Liu, Guojiang Xin

, Qiuwei Yang:
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency. 9921209:1-9921209:15 - (Withdrawn) A Segmentation Algorithm of Image Semantic Sequence Data Based on Graph Convolution Network. 5596820:1-5596820:11

- Yanbin Li

, Yue Li, Huanliang Xu, Shougang Ren
:
An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks. 9919030:1-9919030:16 - Shunhao Jin, Fenlin Liu, Chunfang Yang

, Yuanyuan Ma, Yuan Liu:
Feature Selection of the Rich Model Based on the Correlation of Feature Components. 6680528:1-6680528:12 - Ruixin Shi

, Yongbin Zhou
, Yong Li, Weili Han:
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. 5563884:1-5563884:16 - Huiwen Bai

, Guangjie Liu
, Weiwei Liu, Yingxue Quan, Shuhua Huang:
N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection. 5599556:1-5599556:17 - (Withdrawn) Research on Market Stock Index Prediction Based on Network Security and Deep Learning. 5522375:1-5522375:8

- Bashar Ahmad Khalaf, Salama A. Mostafa

, Aida Mustapha
, Mazin Abed Mohammed
, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak
, Mohamed Elhoseny
, Adam Marks
:
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments. 5542919:1-5542919:17 - Sensen Guo

, Jinxiong Zhao
, Xiaoyu Li, Junhong Duan, Dejun Mu, Xiao Jing:
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models. 5578335:1-5578335:13 - Sachin Lalar

, Shashi Bhushan
, Surender Jangra
, Mehedi Masud
, Jehad F. Al-Amri
:
An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model. 9924478:1-9924478:17 - Fatemeh Aliannejad

, Esmaeel Tahanian
, Mansoor Fateh
, Mohsen Rezvani
:
A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface. 5587656:1-5587656:13 - Miqi Wu, Lin You

, Gengran Hu
, Liang Li, Chengtang Cao
:
A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture. 5592119:1-5592119:20 - Tarek Frikha

, Faten Chaabane
, Nadhir Aouinti
, Omar Cheikhrouhou
, Nader Ben Amor
, Abdelfateh Kerrouche:
Implementation of Blockchain Consensus Algorithm on Embedded Architecture. 9918697:1-9918697:11 - Haiyan Kang

, Yanhang Xiao
, Jie Yin:
An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks. 5518220:1-5518220:11 - Bowei Hao

, Guoyong Wang
, Mingchuan Zhang
, Junlong Zhu
, Ling Xing
, Qingtao Wu
:
Stochastic Adaptive Forwarding Strategy Based on Deep Reinforcement Learning for Secure Mobile Video Communications in NDN. 6630717:1-6630717:13 - Donglai Fu

, Yanhua Liu
:
Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module. 8859618:1-8859618:12 - (Withdrawn) Interactive Application of Virtual Reality and Intelligent Big Data in Landscape Design. 5572841:1-5572841:9

- Khizar Abbas

, Lo'ai Ali Tawalbeh, Ahsan Rafiq
, Ammar Muthanna
, Ibrahim A. Elgendy
, Ahmed A. Abd El-Latif
:
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. 5597679:1-5597679:13 - Jeng-Shyang Pan

, Fang Fan
, Shu-Chuan Chu
, Huiqi Zhao
, Gao-Yuan Liu
:
A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks. 5540895:1-5540895:15 - Zhenjun Tang

, Shaopeng Zhang
, Zhenhai Chen
, Xianquan Zhang
:
Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures. 9930673:1-9930673:11 - Yanan Liu

, Yijun Cui, Lein Harn, Zheng Zhang
, Hao Yan, Yuan Cheng, Shuo Qiu
:
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks. 5532683:1-5532683:13 - Bo Liu

, Jinfu Chen
, Songling Qin, Zufa Zhang, Yisong Liu, Lingling Zhao, Jingyi Chen:
An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic. 5518909:1-5518909:14 - Xinlei Jin

, Dengpan Ye
, Chuanxi Chen
:
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals. 6626974:1-6626974:8 - Guangjun Liu

, Wangmei Guo
, Ximeng Liu
, Jinbo Xiong
:
Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage. 6652606:1-6652606:8 - Guanyu Lu

, Xiuxia Tian
:
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM. 6631075:1-6631075:21 - Jing Zhao

, Shubo Liu
, Xingxing Xiong
, Zhaohui Cai:
Differentially Private Autocorrelation Time-Series Data Publishing Based on Sliding Window. 6665984:1-6665984:10 - Fang Mei

, Tianchang Gao
, Yingda Lyu
:
CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection. 6688393:1-6688393:13 - Zitong Li, Xiang Cheng, Lixiao Sun, Ji Zhang, Bing Chen

:
A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks. 9961342:1-9961342:14 - Fulong Chen

, Yuqing Tang
, Xu Cheng
, Dong Xie
, Taochun Wang
, Chuanxin Zhao
:
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems. 5580939:1-5580939:13 - Zhishuo Zhang

, Wei Zhang, Zhiguang Qin
:
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT. 6676862:1-6676862:16 - Eman Yasser Daraghmi

, Mamoun Abu Helou
, Yousef-Awwad Daraghmi
:
A Blockchain-Based Editorial Management System. 9927640:1-9927640:17 - Pan Zhang, Fenggang Lai, Jing Du, Wenda Lu, Xiao Yu

:
A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid. 5513590:1-5513590:7 - (Withdrawn) Deformation Detection Model of High-Rise Building Foundation Pit Support Structure Based on Neural Network and Wireless Communication. 5525616:1-5525616:10

- (Withdrawn) Distributed Network Image Processing System and Transmission Control Algorithm. 5517843:1-5517843:10

- Lu Yang

, Xingshu Chen
, Yonggang Luo
, Xiao Lan
, Li Chen:
PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT. 5552501:1-5552501:11 - Mourade Azrour

, Jamal Mabrouki
, Rajasekhar Chaganti
:
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT. 5546334:1-5546334:12 - Gaopan Hou

, Jianfeng Ma
, Jiayi Li
, Chen Liang
:
Audit Outsourced Data in Internet of Things. 6662135:1-6662135:11 - (Withdrawn) Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion. 6624809:1-6624809:23

- Jian Wang

, Shanshan Cui, Guosheng Zhao, Zhong-Nan Zhao:
Diffusion Analysis and Incentive Method for Mobile Crowdsensing User Based on Knowledge Graph Reasoning. 6697862:1-6697862:15 - Chao Li

, Jun Li, Yafei Li, Lingmin He, Xiaokang Fu, Jingjing Chen
:
Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art. 9948808:1-9948808:13 - Youngjun Moon

, Intae Ryoo
, Seokhoon Kim
:
Face Antispoofing Method Using Color Texture Segmentation on FPGA. 9939232:1-9939232:11 - Nitheesh Murugan Kaliyamurthy

, Swapnesh Taterh, Suresh Shanmugasundaram, Ankit Saxena
, Omar Cheikhrouhou
, Hadda Ben Elhadj
:
Software-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective. 9971705:1-9971705:7 - (Withdrawn) Improving Convolutional Neural Networks with Competitive Activation Function. 1933490:1-1933490:9

- Zhiqiang Wang, Xiaorui Ren, Shuhao Li, Bingyan Wang, Jianyi Zhang

, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. 5518528:1-5518528:12 - Xiang Yu

, Chun Shan
, Jilong Bian
, Xianfei Yang
, Ying Chen
, Haifeng Song
:
AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment. 9954951:1-9954951:12 - Darpan Anand

, Vineeta Khemchandani, Munish Sabharwal
, Omar Cheikhrouhou
, Ouissem Ben Fredj
:
Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems. 9940183:1-9940183:15 - Meng Cai, Ying Cui, Yang Yu, Ying Xue, Han Luo:

Trusted QoS Assurance Approach for Composite Service. 9934138:1-9934138:15 - Lingling Wang

, Zhongda Cao, Peng Zhou, Xueqin Zhao:
Towards a Smart Privacy-Preserving Incentive Mechanism for Vehicular Crowd Sensing. 5580089:1-5580089:16 - Jian Xie

, Wenan Tan, BingWu Fang
, Zhiqiu Huang:
Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification. 5536722:1-5536722:12 - Mahboubeh Nazari, Arash Maneshi

:
Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record. 5514944:1-5514944:15 - Hassan El Gafif

, Ahmed Toumanari
:
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption. 8834616:1-8834616:17 - Honglei Li

, Weilian Xue
:
A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof. 5523394:1-5523394:10 - Riadh Ayachi

, Ayoub Mhaouch, Abdessalem Ben Abdelali
:
Lightweight Cryptography for Network-on-Chip Data Encryption. 9943713:1-9943713:10 - Shehzad Ashraf Chaudhry

:
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles. 5554318:1-5554318:9 - (Withdrawn) An Online Arrangement Method of Difficult Actions in Competitive Aerobics Based on Multimedia Technology. 9968401:1-9968401:12

- (Withdrawn) Design of Teaching Video Resource Management System in Colleges and Universities based on Microtechnology. 9914048:1-9914048:11

- Khuda Bux Jalbani

, Muhammad Yousaf
, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei
, Akhtar Hussain
, Zojan Memon
:
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors. 5523806:1-5523806:11 - Gaoyuan Zhang

, Haiqiong Li
, Congzheng Han
, Congyu Shi
, Hong Wen, Dan Wang:
Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels. 6641192:1-6641192:19 - (Withdrawn) Real-Time Collection of Training Distance of Long-Distance Runners Based on Wireless Sensor Network. 9992239:1-9992239:11

- Jinchang Hu

, Jinfu Chen
, Sher Ali
, Bo Liu
, Jingyi Chen
, Chi Zhang
, Jian Yang
:
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter. 5581274:1-5581274:14 - Sheng Ren

, Jianqi Li
, Tianyi Tu
, Yibo Peng
, Jian Jiang
:
Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety. 9999398:1-9999398:14 - Yunhong Zhou

, Jiehui Nan, Licheng Wang
:
Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things. 6649119:1-6649119:14 - Wenmin Li, Sanqi Sun, Shuo Zhang

, Hua Zhang, Yijie Shi:
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data. 6674325:1-6674325:11 - Shyam Deshmukh

, Komati Thirupathi Rao
, Mohammad Shabaz
:
Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework. 8340925:1-8340925:9 - Jiangbo Zou, Xiaokang Fu, Lingling Guo, Chunhua Ju, Jingjing Chen

:
Creating Ensemble Classifiers with Information Entropy Diversity Measure. 9953509:1-9953509:11 - Jia Chen

, Quankai Qi
, Yongjie Wang
, Xuehu Yan
, Longlong Li
:
Data Hiding Based on Mini Program Code. 5546344:1-5546344:12 - Shin-Yan Chiou

, Yi-Xuan He
:
Generalized Proxy Oblivious Signature and Its Mobile Application. 5531505:1-5531505:16 - Yongjie Wang

, Jia Chen
, Qinghong Gong
, Xuehu Yan
, Yuyuan Sun
:
Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery. 5597592:1-5597592:11 - Binbin Huang

, Yuanyuan Xiang, Dongjin Yu
, Jiaojiao Wang, Zhongjin Li, Shangguang Wang
:
Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing. 5532410:1-5532410:13 - Songpon Teerakanok

, Tetsutaro Uehara
, Atsuo Inomata
:
Migrating to Zero Trust Architecture: Reviews and Challenges. 9947347:1-9947347:10 - Weiyu Jiang

, Bingyang Liu, Chuang Wang, Xue Yang:
Security-Oriented Network Architecture. 6694650:1-6694650:16 - Xingsi Xue

, Xiaojing Wu
, Jie Zhang, Lingyu Zhang
, Hai Zhu
, Guojun Mao:
Aggregating Heterogeneous Sensor Ontologies with Fuzzy Debate Mechanism. 2878684:1-2878684:12 - Zuguo Chen

, Yanglong Liu
, Chaoyang Chen
, Ming Lu
, Xuzhuo Zhang
:
Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model. 9994127:1-9994127:13 - Ke Yuan

, Yahui Wang
, Yingming Zeng
, Wenlei Ouyang
, Zheng Li
, Chunfu Jia
:
Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model. 5593363:1-5593363:10 - Huixia Zhang

, Guowei Shen
, Chun Guo
, Yunhe Cui, Chaohui Jiang:
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. 5586335:1-5586335:12 - Huige Wang

, Xing Chang, Kefei Chen:
CLE against SOA with Better Data Security Storage to Cloud 5G. 6695964:1-6695964:11 - Yewen Wu

, Shi Zeng
, Bin Wu
, Bin Yang
, Xianyi Chen
:
Quantitative Weighted Visual Cryptographic (k, m, n) Method. 9968652:1-9968652:13 - Hao Yan

, Yanan Liu, Zheng Zhang
, Qian Wang:
Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage. 6639634:1-6639634:11 - Yuanlong Cao

, Ruiwen Ji
, Lejun Ji
, Mengshuang Bao
, Lei Tao
, Wei Yang
:
Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms. 9963829:1-9963829:11 - Fatima Ezzahra Ziani

, Anas Sadak
, Charifa Hanin
, Bouchra Echandouri
, Fouzia Omary
:
CFA: A New Family of Hybrid CA-Based PRNGs. 6640052:1-6640052:21 - Huiying Hou

, Shidi Hao, Jiaming Yuan
, Shengmin Xu, Yunlei Zhao
:
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal. 3680359:1-3680359:20 - Mahammad Shareef Mekala

, Rizwan Patan
, SK Hafizul Islam
, Debabrata Samanta
, Ghulam Ali Mallah
, Shehzad Ashraf Chaudhry
:
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre. 6688162:1-6688162:16 - Jie Min

, Junbin Liang
, Xingpo Ma
, Hongling Chen
:
STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems. 9939796:1-9939796:16 - Tao Li

, Yuling Chen
, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu
, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". 9856969:1-9856969:2 - (Withdrawn) More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras. 9930467:1-9930467:10

- Xingxing Xiong

, Shubo Liu
, Dan Li, Zhaohui Cai, Xiaoguang Niu
:
Corrigendum to "A Comprehensive Survey on Local Differential Privacy". 9874067:1-9874067:2 - Xiaodong Zhang

, Ru Li
, Wenhan Hou, Hui Zhao:
V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks. 9942632:1-9942632:17 - Kai Zhang

, Yanping Li
, Laifeng Lu
:
Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT. 9929663:1-9929663:13 - (Withdrawn) Application of Internet of Things and Edge Computing Technology in Sports Tourism Services. 9980375:1-9980375:10

- Muhammad Altaf Khan

, Moustafa M. Nasralla
, Muhammad Muneer Umar
, Zeeshan Iqbal
, Ghani Ur Rehman
, Muhammad Shahzad Sarfraz, Nikumani Choudhury
:
A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions. 9921826:1-9921826:17 - Nianwen Si

, Wenlin Zhang
, Dan Qu
, Xiangyang Luo
, Heyu Chang
, Tong Niu
:
Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models. 6682293:1-6682293:13 - Wei Wang

, Yuchen Qiu, Shichang Xuan
, Wu Yang
:
Early Rumor Detection Based on Deep Recurrent Q-Learning. 5569064:1-5569064:13 - Luhui Yang

, Guangjie Liu
, Weiwei Liu, Huiwen Bai
, Jiangtao Zhai
, Yuewei Dai:
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model. 5567635:1-5567635:20 - Yang Li

, Hongtao Song
, Yunlong Zhao
, Nianmin Yao
, Nianbin Wang
:
Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing. 5518168:1-5518168:20 - Xuan Shen, Lei Cheng, Bing Sun, Jun He

:
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures. 5582711:1-5582711:10 - Weiwei Liu

, Hua Guo
, Yangguang Tian
:
A Secure Distance-Bounding Protocol with Mutual Authentication. 6644326:1-6644326:7 - Yixiao Zhu

, Wenjie Ma
, Jiangtao Cui
, Xiaofang Xia
, Yanguo Peng
, Jianting Ning
:
PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing. 5514137:1-5514137:18 - Hanzhe Yang

, Ruidan Su
, Pei Huang, Yuhan Bai, Kai Fan
, Kan Yang
, Hui Li, Yintang Yang:
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage. 9993855:1-9993855:11 - Zuowen Tan

:
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials. 6697898:1-6697898:21 - Jianguo Sun

, Hanqi Yin
, Ye Tian
, Junpeng Wu
, Linshan Shen
, Lei Chen:
Two-Level Multimodal Fusion for Sentiment Analysis in Public Security. 6662337:1-6662337:10 - Sheng Gao

, Qianqian Su
, Rui Zhang
, Jianming Zhu, Zhiyuan Sui, Junsheng Wang:
A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain. 9992353:1-9992353:10 - (Withdrawn) Finite Element Structure Analysis of Automobile Suspension Control Arm Based on Neural Network Control. 9978701:1-9978701:11

- (Withdrawn) An Extraction Method of Volleyball Spiking Trajectory and Teaching Based on Wireless Sensor Network. 9966994:1-9966994:11

- Ding Wang

, Shuhong Hong
, Qingxuan Wang
:
Revisiting a Multifactor Authentication Scheme in Industrial IoT. 9995832:1-9995832:7 - Syed Mahbub

, Eric Pardede
, A. S. M. Kayes
:
Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact. 5594175:1-5594175:12 - (Withdrawn) Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model. 5569745:1-5569745:14

- (Withdrawn) Research on Basketball Goal Recognition Based on Image Processing and Improved Algorithm. 9996736:1-9996736:10

- (Withdrawn) Tourist Demand Prediction Model Based on Improved Fruit Fly Algorithm. 3411797:1-3411797:11

- Heng Yin

, Hengwei Zhang
, Jindong Wang
, Ruiyu Dou
:
Boosting Adversarial Attacks on Neural Networks with Better Optimizer. 9983309:1-9983309:9 - Baoying Chen

, Shunquan Tan
:
FeatureTransfer: Unsupervised Domain Adaptation for Cross-Domain Deepfake Detection. 9942754:1-9942754:8 - Aya Jaradat

, Eyad Taqieddin
, Moad Mowafi
:
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization. 6679284:1-6679284:11 - Yining Hu

, Zhe Wang, Yueli Pan, Lizhe Xie
, Zheng Wang:
Craniofacial Reconstruction via Face Elevation Map Estimation Based on the Deep Convolution Neutral Network. 9987792:1-9987792:9 - Da-Zhi Sun

, Ji-Dong Zhong:
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing. 5598574:1-5598574:12 - Mingzhen Li

, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen
, Yixian Yang, Guangcan Yang:
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. 5556155:1-5556155:22 - Guoqi Liu

, Ruonan Gu, Jiantao Wang, Weidong Yan
:
Personal Trajectory with Ring Structure Network: Algorithms and Experiments. 9974191:1-9974191:8 - (Withdrawn) Influencing Factors of Cross-Border E-Commerce Consumer Purchase Intention Based on Wireless Network and Machine Learning. 9984213:1-9984213:9

- Wenjing Zeng

, Rui Tang
, Haizhou Wang
, Xingshu Chen
, Wenxian Wang
:
User Identification Based on Integrating Multiple User Information across Online Social Networks. 5533417:1-5533417:14 - Xiujuan Wang

, Yi Sui
, Yuanrui Tao
, Qianqian Zhang
, Jianhua Wei:
Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution. 6653430:1-6653430:14 - (Withdrawn) Static Characteristics of a Linear Bipotentiometer Sensor. 9958652:1-9958652:9

- (Withdrawn) Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information. 4513992:1-4513992:12

- (Withdrawn) Design of Distributed Collection Model of Student Development Information Based on Internet of Things Technology. 6505359:1-6505359:10

- Qiang Zuo

, Songyu Chen
, Zhifang Wang
:
R2AU-Net: Attention Recurrent Residual Convolutional Neural Network for Multimodal Medical Image Segmentation. 6625688:1-6625688:10 - John Prakash Arockiasamy

, Lydia Elizabeth Benjamin
, Vaidheyanathan Rhymend Uthariaraj:
Beyond Statistical Analysis in Chaos-Based CSPRNG Design. 5597720:1-5597720:14 - Chao Su

, Qingkai Zeng
:
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures. 5559552:1-5559552:15 - (Withdrawn) Research on Risk Measurement and Early Warning of Electronic Banking Business Based on GMDH Algorithm. 2678161:1-2678161:9

- Guozhong Dong

, Weizhe Zhang
, Haowen Tan
, Rahul Yadav
, Shuaishuai Tan
:
EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements. 9954957:1-9954957:11 - Won-Bin Kim, Daehee Seo, Donghyun Kim, Im-Yeong Lee

:
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication. 5599996:1-5599996:14 - Long Wei, Gang Chen

, Wenjie Sun, Guoqi Li
:
Recognition of Operating Characteristics of Heavy Trucks Based on the Identification of GPS Trajectory Stay Points. 9998405:1-9998405:12 - Yan Jiang, Guisheng Yin

, Ye Yuan, Qingan Da:
Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification. 6663028:1-6663028:13 - Long Chen, Guojiang Xin

, Yuling Liu, Junwei Huang:
Driver Fatigue Detection Based on Facial Key Points and LSTM. 5383573:1-5383573:9 - Yue Wang

, Yiming Jiang, Julong Lan:
FCNN: An Efficient Intrusion Detection Method Based on Raw Network Traffic. 5533269:1-5533269:13 - Zhiwen Xiao

, Jianbin Jiao
:
Explainable Fraud Detection for Few Labeled Time Series Data. 9941464:1-9941464:9 - Tianpeng Deng

, Xuan Li
, Biao Jin, Lei Chen, Jie Lin:
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT. 5519558:1-5519558:13 - Priyanka Dixit

, Rashi Kohli
, Ángel Eduardo Acevedo-Duque, Romel Ramón González-Díaz
, Rutvij H. Jhaveri
:
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection. 5561816:1-5561816:23 - Hanrui Zhang

, Qianmu Li
, Shunmei Meng, Zhuoran Xu, Chaoxian Lv:
An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things. 5562275:1-5562275:8 - Liang-Jia Tong, Nan-Run Zhou

, Zhi-Jing Huang, Xin-Wen Xie
, Ya-Ru Liang:
Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences. 6650515:1-6650515:18 - Yi-Fan Tseng

, Chun-I Fan
:
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model. 5519721:1-5519721:11 - Qing Yan, Lipeng Song

, Chenlu Zhang, Jing Li, Shanshan Feng:
Modeling and Control of Malware Propagation in Wireless IoT Networks. 4133474:1-4133474:13 - Wenliang Xu

, Futai Zou
:
Obfuscated Tor Traffic Identification Based on Sliding Window. 5587837:1-5587837:11 - Aolin Che, Yalin Liu, Hong Xiao

, Hao Wang
, Ke Zhang, Hong-Ning Dai
:
Augmented Data Selector to Initiate Text-Based CAPTCHA Attack. 9930608:1-9930608:9 - (Withdrawn) How Does the Urgency of Borrowing in Text Messages Affect Loan Defaults? Evidence from P2P Loans in China. 4060676:1-4060676:13

- Renjie Zhou

, Xiao Wang
, Jingjing Yang
, Wei Zhang
, Sanyuan Zhang
:
Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy. 5560185:1-5560185:9 - Dapeng Man

, Yongjia Mu, Jiafei Guo, Wu Yang, Jiguang Lv, Wei Wang
:
Cache Pollution Detection Method Based on GBDT in Information-Centric Network. 6658066:1-6658066:10 - Guihua Tang

, Lei Sun
, Xiuqing Mao
, Song Guo
, Hongmeng Zhang
, Xiaoqin Wang
:
Detection of GAN-Synthesized Image Based on Discrete Wavelet Transform. 5511435:1-5511435:10 - Gaigai Tang, Lin Yang

, Shuangyin Ren
, Lianxiao Meng, Feng Yang, Huiqiang Wang
:
An Automatic Source Code Vulnerability Detection Approach Based on KELM. 5566423:1-5566423:12 - Zilin Qiang, Yingsen Wang, Kai Song

, Zijuan Zhao
:
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain. 5553874:1-5553874:10 - Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao

:
Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis. 9927325:1-9927325:19 - Mengli Wang

, Lipeng Song
:
An Incentive Mechanism for Reporting Phishing E-Mails Based on the Tripartite Evolutionary Game Model. 3394325:1-3394325:8 - Lingzan Yu

, Yanli Ren
, Guorui Feng
, Xinpeng Zhang
:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. 6184920:1-6184920:14 - Yang Bai

, Yu Li, Mingchuang Xie, Mingyu Fan
:
A Defense Framework for Privacy Risks in Remote Machine Learning Service. 9924684:1-9924684:13 - (Withdrawn) CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification. 5518460:1-5518460:15

- Yi Huang, Shah Nazir

, Xinqiang Ma
, Shiming Kong, Youyuan Liu:
Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm. 1852466:1-1852466:11 - Yi Peng

, Qi Han
, Fei Su
, Xingwei He
, Xiaohu Feng
:
Meteorological Satellite Operation Prediction Using a BiLSTM Deep Learning Model. 9916461:1-9916461:9 - Ke Shao

, Qiang Xiong, Zhiming Cai
:
FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection. 6642252:1-6642252:13 - Hao Zhu

, Mulan Wang
, Weiye Xu
:
Research on Calibration Method of Binocular Vision System Based on Neural Network. 5542993:1-5542993:9 - (Withdrawn) A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks. 9994136:1-9994136:10

- Paul Marillonnet

, Mikaël Ates
, Maryline Laurent
, Nesrine Kaaniche
:
An Efficient User-Centric Consent Management Design for Multiservices Platforms. 5512075:1-5512075:19 - (Withdrawn) Remote Evaluation System of Tennis Batting Action Standard Based on Acceleration Sensor. 9930084:1-9930084:11

- Lingyan Xue, Qinglong Huang

, Shuaiqing Zhang
, Haiping Huang
, Wenming Wang
:
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT. 3300769:1-3300769:15 - Taochun Wang

, Chengmei Lv, Chengtian Wang, Fulong Chen
, Yonglong Luo
:
A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing. 2296386:1-2296386:15 - Zhonghua Zhang, Xifei Song

, Lei Liu
, Jie Yin
, Yu Wang
, Dapeng Lan
:
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work. 9991535:1-9991535:15 - Mingyang Song

, Yingpeng Sang
, Yuying Zeng
, Shunchao Luo
:
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption. 9962575:1-9962575:14 - (Withdrawn) A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph. 9999798:1-9999798:14

- Vikram Raju Reddicherla

, Umashankar Rawat
, Y. Jeevan Nagendra Kumar
, Atef Zaguia
:
Secure Vertical Handover to NEMO Using Hybrid Cryptosystem. 6751423:1-6751423:12 - Zhiqiang Wang

, Yuheng Lin
, Zihan Zhuo
, Jieming Gu
, Tao Yang:
GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing. 9946022:1-9946022:14 - Tsu-Yang Wu

, Zhiyuan Lee
, Lei Yang
, Chien-Ming Chen
:
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks. 9944460:1-9944460:17 - (Withdrawn) The Segmentation of Road Scenes Based on Improved ESPNet Model. 1681952:1-1681952:11

- Hung-Yu Chien

:
Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes. 2942568:1-2942568:11 - Jabar Mahmood

, Zongtao Duan
, Yun Yang
, Qinglong Wang
, Jamel Nebhen
, Muhammad Nasir Mumtaz Bhutta
:
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures. 9997771:1-9997771:20 - (Withdrawn) High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection. 9606116:1-9606116:12

- Amir Chaaf, Mohammed Saleh Ali Muthanna

, Ammar Muthanna, Soha Alhelaly, Ibrahim A. Elgendy
, Abdullah M. Iliyasu
, Ahmed A. Abd El-Latif
:
Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network. 9969605:1-9969605:20 - Huifang Yu

, Weike Wang
:
Certificateless Network Coding Ring Signature Scheme. 8029644:1-8029644:10 - Shichang Xuan

, Ming Jin
, Xin Li
, Zhaoyuan Yao
, Wu Yang, Dapeng Man
:
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems. 9965157:1-9965157:14 - Fazle Rabby Khan

, Md. Muhabullah
, Roksana Islam
, Mohammad Monirujjaman Khan
, Mehedi Masud
, Sultan Aljahdali
, Avinash Kaur
, Parminder Singh
:
A Cost-Efficient Autonomous Air Defense System for National Security. 9984453:1-9984453:10 - Wei Ma

, Qinglei Zhou
, Mingsheng Hu, Xing Wang:
A Deep Learning-Based Trust Assessment Method for Cloud Users. 9937229:1-9937229:11 - Jiayu Wang

, Xuehu Yan
, Jia Chen
, Yongqiang Yu
:
An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image. 9960998:1-9960998:14 - Junfeng Tian

, Yue Li
:
Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection. 9717747:1-9717747:14 - Xiaodong Liu

, Tong Li, Runzi Zhang
, Di Wu
, Yongheng Liu, Zhen Yang:
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. 9947059:1-9947059:15 - Zakariae El Ouazzani

, An Braeken
, Hanan El Bakkali
:
Proximity Measurement for Hierarchical Categorical Attributes in Big Data. 6612923:1-6612923:17 - Xiaodong Zhang

, Ru Li
, Wenhan Hou
, Jinshan Shi
:
Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network. 9967829:1-9967829:13 - Jianming Zhao

, Peng Zeng
, Yingjun Liu
, Tianyu Wang:
On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication. 4539540:1-4539540:12 - Hao Liu

, Rongbo Zhu
, Jun Wang, Wengang Xu:
Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking. 3717702:1-3717702:13 - Jinglan Ou

, Hangchuan Shi
, Liubin Wang, Rui Ma
, Haowei Wu
:
Analysis of SWIPT-Enabled Relay Networks with Full-Duplex Destination-Aided Jamming. 6193012:1-6193012:18 - Jian Jiang

, Fen Zhang
:
Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System. 3578695:1-3578695:12 - Yongqiang Zhou

, Huan Qian, Qihao Wang, Suoping Li:
Performance Modeling Analysis of D-MSMR-CARQ with Relay Selection in Wireless Sensor Networks. 5533926:1-5533926:11 - Lin Zhang

, Xinyan Wei, Yanwen Huang, Haiping Huang
, Xiong Fu
, Ruchuan Wang:
GT-Bidding: Group Trust Model of P2P Network Based on Bidding. 8842181:1-8842181:13 - Christian Johansen

, Aulon Mujaj, Hamed Arshad
, Josef Noll:
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications. 9965573:1-9965573:30 - Jianbo Du, Yan Sun, Aijing Sun

, Guangyue Lu
, Zhixian Chang, Haotong Cao, Jie Feng:
Cost-Effective Optimization for Blockchain-Enabled NOMA-Based MEC Networks. 8259817:1-8259817:9 - M. Yasir Mehmood, Ammar Oad

, Muhammad Abrar
, Hafiz Mudassir Munir
, Syed Faraz Hasan
, Hafiz Abd Ul Muqeet, Noorbakhsh Amiri Golilarz:
Edge Computing for IoT-Enabled Smart Grid. 5524025:1-5524025:16 - (Withdrawn) Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network. 9938586:1-9938586:12

- Maohua Guo

, Jinlong Fei
, Yitong Meng
:
Deep Nearest Neighbor Website Fingerprinting Attack Technology. 5399816:1-5399816:14 - Yannick Abanda

, Alain Tiedeu
, Guillaume Kom
:
Image Encryption with Fusion of Two Maps. 6624890:1-6624890:16 - Zelin Zhang

, Jian Xu
, Bin Ma
, Chunpeng Wang
, Jian Li
, Yuli Wang
:
Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding. 5511806:1-5511806:11 - Lin Ge

, Tao Jiang
:
A Privacy Protection Method of Lightweight Nodes in Blockchain. 2067137:1-2067137:17 - (Withdrawn) Hybrid Structures Applied to Subalgebras of BCH-Algebras. 8960437:1-8960437:8

- Dan Tang

, Hongliang Cai
:
A Novel Decoding Method for the Erasure Codes. 8755697:1-8755697:12 - Jianguo Sun

, Yang Yang
, Zechao Liu
, Yuqing Qiao
:
Multi-Authority Criteria-Based Encryption Scheme for IoT. 9174630:1-9174630:15 - Hongjian Jin

, Xingshu Chen
, Xiao Lan
, Hui Guo, Hongxia Zhang
, Qi Cao
:
Corrigendum to "BNRDT: When Data Transmission Meets Blockchain". 9814372:1-9814372:1 - Reza Soltani

, Uyen Trang Nguyen
, Aijun An
:
A Survey of Self-Sovereign Identity Ecosystem. 8873429:1-8873429:26 - Pengkun Li

, Jinshu Su
, Xiaofeng Wang
, Qianqian Xing
:
DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability. 1974493:1-1974493:17 - (Withdrawn) Semisupervised Learning-Based Sensor Ontology Matching. 2002307:1-2002307:5

- Yan Zhao

, Shuai Liu
:
Robust Image Hashing Based on Cool and Warm Hue and Space Angle. 3803481:1-3803481:13 - Guoai Xu

, Jiangtao Yuan
, Guosheng Xu
, Zhongkai Dang
:
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. 5566179:1-5566179:8 - Junsong Zhang

, Qikun Zhang, Zhigang Li, Xianling Lu
, Yong Gan:
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks. 4939589:1-4939589:11 - Haibin Yang, Zhengge Yi

, Ruifeng Li, Zheng Tu, Xu An Wang
, Yuanyou Cui, Xiaoyuan Yang:
Improved Outsourced Provable Data Possession for Secure Cloud Storage. 1805615:1-1805615:12 - (Withdrawn) Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy. 9956773:1-9956773:15

- Ejin Kim

, Hyoung-Kee Choi
:
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild. 6245306:1-6245306:13 - Hai Liu

, Changgen Peng
, Youliang Tian, Shigong Long, Zhenqiang Wu:
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective. 5592191:1-5592191:14 - Guiyong Xu, Yang Xu, Sicong Zhang, Xiaoyao Xie:

SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block. 3676720:1-3676720:11 - Yuye Wang

, Jing Yang
, Jianpei Zhan
:
Differentially Private Attributed Network Releasing Based on Early Fusion. 9981752:1-9981752:13 - Sulaiman Khan

, Habib Ullah Khan
, Shah Nazir
:
Offline Pashto Characters Dataset for OCR Systems. 3543816:1-3543816:7 - (Withdrawn) Research on Classification Method of Network Resources Based on Modified SVM Algorithm. 5841829:1-5841829:8

- Haibin Shi, Guang Cheng

, Ying Hu, Fuzhou Wang, Haoxuan Ding:
RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network. 9409473:1-9409473:10 - Hansong Du

, Jiu-fen Liu
, Yu-guo Tian
, Xiangyang Luo
:
Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes. 5495941:1-5495941:16 - Yubo Song

, Yijin Geng, Junbo Wang, Shang Gao, Wei Shi:
Permission Sensitivity-Based Malicious Application Detection for Android. 6689486:1-6689486:12 - Yuxian Huang

, Geng Yang, Yahong Xu, Hao Zhou:
Differential Privacy Principal Component Analysis for Support Vector Machines. 5542283:1-5542283:12 - Xingzheng Li

, Bingwen Feng
, Guofeng Li
, Tong Li
, Mingjin He
:
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code. 9997641:1-9997641:11 - Feng Xiao

, Enhong Chen
, Qiang Xu, Xianguo Zhang:
ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System. 7525092:1-7525092:14 - (Withdrawn) Design of Multimedia Vocal Music Education Data Integration System Based on Adaptive Genetic Algorithm. 3897696:1-3897696:9

- Yichuan Wang

, Han Yu
, Xinhong Hei
, Binbin Bai, Wenjiang Ji:
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT. 9179286:1-9179286:13 - Jiu Lou

, Zhongliang Xu, Decheng Zuo
, Hongwei Liu
:
Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD. 5566347:1-5566347:12 - Yu Zhou

, Yongzhuang Wei, Hailong Zhang, Wenzheng Zhang:
On the Modified Transparency Order of n , m -Functions. 6640099:1-6640099:14 - Yifan Luo, Feng Ye, Bin Weng

, Shan Du
, Tianqiang Huang:
A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training. 4280328:1-4280328:10 - (Withdrawn) An Improved Cuckoo Search Algorithm for Multithreshold Image Segmentation. 6036410:1-6036410:10

- Lihua Zhang

, Yu Cao
, Ganzhe Zhang
, Yang Huang
, Chen Zheng
:
A Blockchain-Based Microgrid Data Disaster Backup Scheme in Edge Computing. 9121571:1-9121571:19 - Hao Yang

, Qin He
, Zhenyan Liu
, Qian Zhang
:
Malicious Encryption Traffic Detection Based on NLP. 9960822:1-9960822:10 - (Withdrawn) Research on Evaluation Method of Sports Events Based on Edge Algorithm. 1903699:1-1903699:9

- (Withdrawn) Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things. 2136776:1-2136776:10

- (Withdrawn) Research on the Management Information System of College Education and Teaching Based on Web. 5090813:1-5090813:8

- Hwanjo Heo

, Seungwon Shin
:
Understanding Block and Transaction Logs of Permissionless Blockchain Networks. 9549602:1-9549602:18 - Shuailiang Zhang

, Xiujuan Du
, Xin Liu:
An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks. 2037188:1-2037188:17 - Xiang Liu

, Yuchun Guo, Xiaoying Tan, Yishuai Chen:
Differentially Private Web Browsing Trajectory over Infinite Streams. 9968905:1-9968905:14 - Junjie Huang, Liang Tan, Sun Mao

, Keping Yu
:
Blockchain Network Propagation Mechanism Based on P4P Architecture. 8363131:1-8363131:12 - Chalee Vorakulpipat

, Ryan K. L. Ko
, Qi Li
, Ahmed Meddahi
:
Security and Privacy in Smart Cities. 9830547:1-9830547:2 - Alireza Chamkoori

, Serajdean Katebi
:
Robustness of the Storage in Cloud Data Centers Based on Simple Swarm Optimization Algorithm. 6667210:1-6667210:17 - Wentao Yu

, Xiaohui Huang, Qingjun Yuan, Mianzhu Yi
, Sen An, Xiang Li:
Information Security Field Event Detection Technology Based on SAtt-LSTM. 5599962:1-5599962:8 - Luo Sheng

:
User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption. 6617669:1-6617669:11 - Yibo Han, Weiwei Zhang, Zheng Zhang

:
Security Analysis of Intelligent System Based on Edge Computing. 1224333:1-1224333:10 - (Withdrawn) Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network. 3913515:1-3913515:21

- Xieyang Shen

, Chuanhe Huang
, Xiajiong Shen, Jiaoli Shi
, Danxin Wang:
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction. 7249470:1-7249470:11 - Zelin Deng

, Qiran Zhu
, Pei He
, Dengyong Zhang
, Yuansheng Luo
:
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification. 6854586:1-6854586:12 - Yunhui Li

, Liang Chang
, Long Li
, Xuguang Bao
, Tianlong Gu
:
TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making. 5448397:1-5448397:14 - Han Zhong

, Ruize Sun
, Fengcheng Mei
, Yong Chen
, Fan Jin
, Lei Ning
:
Deep Grid Scheduler for 5G NB-IoT Uplink Transmission. 5263726:1-5263726:10 - (Withdrawn) Design of Project Cost Risk Management System Based on Improved Fuzzy Rule Weight Algorithm. 4688846:1-4688846:9

- (Withdrawn) Design and Reconstruction of Visual Art Based on Virtual Reality. 1014017:1-1014017:9

- Liyan Zhu

, Jinwei Wang
, Xiangyang Luo
, Yi Zhang
, Chunfang Yang
, Fenlin Liu
:
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks. 9864833:1-9864833:15 - Jiatong Li, Zhibo Li, Xuanying Li, Cheng Wang

:
Energy-Saving D2D Wireless Networking Based on ACO and AIA Fusion Algorithm. 5781166:1-5781166:9 - (Withdrawn) Research on the Mental Health of College Students Based on Fuzzy Clustering Algorithm. 3960559:1-3960559:8

- Caixue Zhou

:
A Certificate-Based Provable Data Possession Scheme in the Standard Model. 9974485:1-9974485:12 - Yanli Shi

, Pengpeng Sheng
:
J-Net: Asymmetric Encoder-Decoder for Medical Semantic Segmentation. 2139024:1-2139024:8 - (Withdrawn) Analysis and Research of Psychological Education Based on Data Mining Technology. 8979507:1-8979507:8

- (Withdrawn) Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm. 4503358:1-4503358:10

- (Withdrawn) Orthogonal Frequency Division Multiplexing Underwater Acoustic Communication System with Environmental Cognition Ability. 1640072:1-1640072:12

- Peng Li

, Junzuo Lai
, Yongdong Wu:
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting. 6611518:1-6611518:17 - Luke Cranfill

, Jeehyeong Kim
, Hongkyu Lee
, Victor Youdom Kemmoe
, Sunghyun Cho
, Junggab Son
:
Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming. 4702469:1-4702469:14 - Ming Li

, Dezhi Han
, Xinming Yin
, Han Liu
, Dun Li
:
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features. 7045823:1-7045823:15 - Yan Mi

, Hengwei Zhang
, Hao Hu
, Jinglei Tan
, Jindong Wang
:
Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model. 5594697:1-5594697:16 - Guangquan Xu, Guofeng Feng

, Litao Jiao, Meiqi Feng, Xi Zheng
, Jian Liu
:
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services. 5395705:1-5395705:10 - Wei Dai

, Wei Wang
, Zhongtian Mao
, Ruwen Jiang
, Fudong Nian
, Teng Li
:
Distributed Policy Evaluation with Fractional Order Dynamics in Multiagent Reinforcement Learning. 1020466:1-1020466:7 - (Withdrawn) Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology. 9294356:1-9294356:12

- Jingjing Zhang

, Xianming Gao
, Lin Yang
, Tao Feng
, Dongyang Li
, Qiang Wang
:
A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking. 1630223:1-1630223:12 - Hyun Kwon

:
MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images. 5595026:1-5595026:8 - Huan Dai

, Pengzhan Shi
, He Huang, Ruyu Chen
, Jun Zhao
:
Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism. 3050953:1-3050953:13 - (Withdrawn) Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network. 4027900:1-4027900:14

- Liquan Chen

, Tianyang Tu, Kunliang Yu
, Mengnan Zhao, Yingchao Wang:
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System. 4660875:1-4660875:13 - Huijie Yang

, Jian Shen
, Junqing Lu
, Tianqi Zhou
, Xueya Xia
, Sai Ji
:
A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare. 5781354:1-5781354:12 - Shuang Yao

, Dawei Zhang
:
Anonymous Certificate-Based Inner Product Broadcast Encryption. 6639835:1-6639835:17 - (Withdrawn) Design of English Interactive Teaching System Based on Association Rules Algorithm. 9275363:1-9275363:10

- Yanli Shao

, Jingru Zhao, Xingqi Wang, Weiwei Wu, Jinglong Fang
:
Research on Cross-Company Defect Prediction Method to Improve Software Security. 5558561:1-5558561:19 - Yujiang Lu

, Yaju Liu
, Jianwei Fei
, Zhihua Xia
:
Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics. 5524930:1-5524930:13 - Jinhuan Duan, Xianxian Li

, Shiqi Gao, Zili Zhong, Jinyan Wang
:
SSGD: A Safe and Efficient Method of Gradient Descent. 5404061:1-5404061:11 - Jianhong Zhang

, Menglong Wu
:
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification. 3963037:1-3963037:13 - (Withdrawn) A New Method of Denoising Crop Image Based on Improved SVD in Wavelet Domain. 9995813:1-9995813:11

- Shanjun Zhan

, Lisu Yu
, Zhen Wang
, Yichen Du
, Yan Yu
, Qinghua Cao
, Shuping Dang
, Zahid Khan
:
Cell Traffic Prediction Based on Convolutional Neural Network for Software-Defined Ultra-Dense Visible Light Communication Networks. 9223965:1-9223965:10 - (Withdrawn) Research on Risk Assessment of Science and Technology Data in Network Finance Based on Portfolio Empowerment. 2425383:1-2425383:10

- (Withdrawn) Intelligent Recognition Method of Vehicle Path with Time Window Based on Genetic Algorithm. 3614291:1-3614291:11

- Zhi Yao

, Hailing Sun
, Guofu Zhou:
Real-Time Facial Expression Recognition System for Video Big Sensor Data Security Application. 9539022:1-9539022:10 - Luping Wang

, Kai Zhang
, Haifeng Qian, Jie Chen
:
Group Signature with Verifier-Local Revocation Based on Coding Theory. 3259767:1-3259767:12 - (Withdrawn) Braking Control System of Oilfield Minor Repair Machine Based on Wireless Sensor Network. 6966041:1-6966041:14

- Chulwon Lee

, Kyungho Lee:
Factors Affecting Corporate Security Policy Effectiveness in Telecommuting. 2634817:1-2634817:13 - Xiaoyu Xu

, Hao Hu, Yuling Liu, Hongqi Zhang, Dexian Chang:
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector. 8848473:1-8848473:17 - Sanjeev Kumar Dwivedi

, Priyadarshini Roy, Chinky Karda, Shalini Agrawal, Ruhul Amin
:
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey. 7142048:1-7142048:21 - (Withdrawn) An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor. 4229013:1-4229013:11

- Azidine Guezzaz, Said Benkirane, Mourade Azrour

, Shahzada Khurram
:
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality. 1230593:1-1230593:8 - Sirajuddin Qureshi

, Jianqiang Li
, Faheem Akhtar
, Saima Tunio, Zahid Hussain Khand
, Ahsan Wajahat
:
Analysis of Challenges in Modern Network Forensic Framework. 8871230:1-8871230:13 - (Withdrawn) Hierarchical Attention Graph Embedding Networks for Binary Code Similarity against Compilation Diversity. 9954520:1-9954520:19

- Siffat Ullah Khan

, Habib Ullah Khan
, Naeem Ullah, Rafiq Ahmad Khan
:
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach. 1024139:1-1024139:20 - Tao Wan

, Shixin Yue
, Weichuan Liao
:
Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing. 4804758:1-4804758:17 - George Iakovakis, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas, Dimitris Gritzalis

:
Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era. 3187205:1-3187205:21 - (Withdrawn) HS-MOEA/D: An Oriented Algorithm for Delay and Reliability VNF-SC Deployment. 5538931:1-5538931:9

- Gholamreza Farahani

:
Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks. 8814141:1-8814141:15 - Wenle Bai, Zhongjun Yang

, Jianhong Zhang, Rajiv Kumar:
Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing. 4348511:1-4348511:9 - Wenqiu Zhu

, Guang Zou
, Qiang Liu
, Zhigao Zeng
:
An Enhanced Visual Attention Siamese Network That Updates Template Features Online. 9719745:1-9719745:19 - Tianqi Zhou

, Jian Shen
, Yongjun Ren
, Sai Ji
:
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems. 1864514:1-1864514:8 - Qing Ren, Feng Tian

, Xiangyi Lu, Yumeng Shen, Zhenqiang Wu, Xiaolin Gui:
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks. 5317062:1-5317062:12 - Hanqing Ding, Qing Zhang, Yifeng Yin

, Yong Gan, Weihua Liu:
Research on Lightweight Mutual Authentication for the Product Authorization Chain. 8852901:1-8852901:9 - Zhanhui Yuan

, Wenfa Li
, Zhi Yang
, Lei Sun, Xuehui Du, Hongqi Zhang:
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification. 2481818:1-2481818:22 - Shaik Vaseem Akram

, Sultan S. Alshamrani
, Rajesh Singh
, Mamoon Rashid
, Anita Gehlot
, Ahmed Saeed Alghamdi
, Deepak Prashar
:
Blockchain Enabled Automatic Reward System in Solid Waste Management. 6952121:1-6952121:14 - Junjie Mao, Bin Weng, Tianqiang Huang

, Feng Ye, Liqing Huang:
Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks. 3670339:1-3670339:12 - Lin Liu, Wang Ren, Feng Xie, Shengwei Yi, Junkai Yi, Peng Jia

:
Learning-Based Detection for Malicious Android Application Using Code Vectorization. 9964224:1-9964224:11 - Yingjie Xu

, Gengran Hu
, Lin You
, Chengtang Cao
:
A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability. 5798033:1-5798033:12 - Chuan Mou, Ye Cheng

:
Research on Information Resource Sharing and Big Data of Sports Industry in the Background of OpenStack Cloud Platform. 2824146:1-2824146:12 - Fei Yan

, Xue Yang
, Nianqiao Li
, Xu Yu
, Hongyu Zhai
:
Emotion Generation and Transition of Companion Robots Based on Plutchik's Model and Quantum Circuit Schemes. 6802521:1-6802521:15 - (Withdrawn) Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery. 5287514:1-5287514:16

- Quan Sun

, Xinyu Miao, Zhihao Guan, Jin Wang, Demin Gao
:
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication. 3314595:1-3314595:12 - (Withdrawn) Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model. 5155524:1-5155524:14

- Shudong Li

, Qianqing Zhang
, Xiaobo Wu
, Weihong Han
, Zhihong Tian
:
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. 9396141:1-9396141:12 - Yan Li

, Zheng Wan
:
Blockchain-Enabled Intelligent Video Caching and Transcoding in Clustered MEC Networks. 7443260:1-7443260:17 - (Withdrawn) A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model. 6950711:1-6950711:9

- Muhammad Javed Iqbal, Muhammad Munwar Iqbal, Iftikhar Ahmad, Madini O. Alassafi

, Ahmed S. Alfakeeh
, Ahmed Alhomoud
:
Real-Time Surveillance Using Deep Learning. 6184756:1-6184756:17 - Tsu-Yang Wu

, Lei Yang
, Jia-Ning Luo
, Jimmy Ming-Tai Wu
:
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments. 2299632:1-2299632:15 - ChuanPeng Guo

, Wei Yang
, Mengxia Shuai
, Liusheng Huang
:
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network. 1627486:1-1627486:15 - Feng Luo

, Yifan Jiang
, Zhaojing Zhang
, Yi Ren
, Shuo Hou
:
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey. 1263820:1-1263820:19 - (Withdrawn) Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain. 1439692:1-1439692:9

- Mourade Azrour

, Jamal Mabrouki
, Azidine Guezzaz
, Ambrina Kanwal:
Internet of Things Security: Challenges and Key Issues. 5533843:1-5533843:11 - Xiaofeng Lu

, Songbing Fu
, Cheng Jiang
, Pietro Lió
:
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain. 5308206:1-5308206:13 - Kottapalli Prasanna

, Kadiyala Ramana
, Gaurav Dhiman
, Sandeep Kautish
, V. Deeban Chakravarthy
:
PoC Design: A Methodology for Proof-of-Concept (PoC) Development on Internet of Things Connected Dynamic Environments. 7185827:1-7185827:12 - Zihao Shao, Huiqiang Wang

, Yifan Zou, Zihan Gao, Hongwu Lv:
From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing. 5855745:1-5855745:18 - (Withdrawn) Implementation of English "Online and Offline" Hybrid Teaching Recommendation Platform Based on Reinforcement Learning. 4875330:1-4875330:10

- (Withdrawn) Research on Low Frame Rate Video Compression Algorithm in the Context of New Media. 7494750:1-7494750:10

- Wenjing Lv, Rui Wang

, Jun Wu
, Zhijun Fang, Songlin Cheng
:
Joint Design of Beamforming and Edge Caching in Fog Radio Access Networks. 1935453:1-1935453:8 - (Withdrawn) Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model. 7026064:1-7026064:9

- Yong Zeng

, Yixin Li
, Zhongyuan Jiang, Jianfeng Ma:
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum. 8609278:1-8609278:11 - Zhiming Zhang

, Yu Yang, Wei Yang, Fuying Wu, Ping Li, Xiaoyong Xiong:
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks. 9082570:1-9082570:12 - (Withdrawn) Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus. 5365915:1-5365915:9

- (Withdrawn) Research on Educational Information Platform Based on Cloud Computing. 3109473:1-3109473:11

- Yong Ding

, Hui Xu, Yujue Wang, Fang Yuan, Hai Liang
:
Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks. 9520941:1-9520941:11 - Siriboon Chaisawat

, Chalee Vorakulpipat
:
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue. 8338616:1-8338616:14 - Hang-chao Ding

, Han Jiang
, Qiuliang Xu
:
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE. 9974604:1-9974604:15 - Rajesh L

, Penke Satyanarayana
:
Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol. 8887666:1-8887666:15 - (Withdrawn) Design of Automatic Course Arrangement System for Electronic Engineering Teaching Based on Monte Carlo Genetic Algorithm. 3564722:1-3564722:11

- (Withdrawn) Design of Remote Real-Time Positioning Method for Long-Distance Running under Wireless Network Technology. 5298736:1-5298736:9

- Maohua Guo

, Jinlong Fei
:
Website Fingerprinting Attacks Based on Homology Analysis. 6070451:1-6070451:14 - (Withdrawn) Prediction of IoT Traffic Using the Gated Recurrent Unit Neural Network- (GRU-NN-) Based Predictive Model. 1425732:1-1425732:7

- Kaijiao Huang

, Liansheng Tan
, Gang Peng:
Stability of SDE-LJN System in the Internet to Mitigate Constant-Rate DDoS Attacks. 4733190:1-4733190:17 - (Withdrawn) Accurate Estimation of English Word Similarity Based on Semantic Network. 8112735:1-8112735:9

- Olutosin Taiwo

, Absalom E. Ezugwu
:
Internet of Things-Based Intelligent Smart Home Control System. 9928254:1-9928254:17 - (Withdrawn) Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model. 5441631:1-5441631:11

- Jiajie Liu

, Bing Sun, Chao Li:
New Approach towards Generalizing Feistel Networks and Its Provable Security. 2751797:1-2751797:26 - (Withdrawn) Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques. 9293877:1-9293877:8

- Dongyang Li

, Lin Yang, Hongguang Zhang, Xiaolei Wang
, Linru Ma, Junchao Xiao:
Image-Based Insider Threat Detection via Geometric Transformation. 1777536:1-1777536:18 - Yongli Tang

, Feifei Xia
, Qing Ye
, Mengyao Wang, Ruijie Mu, Xiaohang Zhang:
Identity-Based Linkable Ring Signature on NTRU Lattice. 9992414:1-9992414:17 - Yu Jiang

, Hua Fu, Aiqun Hu, Wen Sun:
A LoRa-Based Lightweight Secure Access Enhancement System. 3530509:1-3530509:16 - (Withdrawn) IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security. 8527068:1-8527068:8

- Tao Zhou

, Kui Xu
, Chunguo Li
, Zhexian Shen
:
Power Optimization for Aerial Intelligent Reflecting Surface-Aided Cell-Free Massive MIMO-Based Wireless Sensor Network. 9989098:1-9989098:10 - Chunxiao Wang

, Jingjing Zhang
, Wei Jiang, Shuang Wang:
A Deep Multimodal Model for Predicting Affective Responses Evoked by Movies Based on Shot Segmentation. 7650483:1-7650483:12 - (Withdrawn) Automatic Calibration Algorithm for English Text Translation Based on Semantic Features. 3870656:1-3870656:8

- (Withdrawn) An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication. 8228300:1-8228300:9

- (Withdrawn) Fog-Driven Secure Authentication and Key Exchange Scheme for Wearable Health Monitoring System. 8368646:1-8368646:14

- Jun He

, Xuan Shen
, Guoqiang Liu:
Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III. 6515844:1-6515844:11 - Xianwei Li

, Baoliu Ye
:
Latency-Aware Computation Offloading for 5G Networks in Edge Computing. 8800234:1-8800234:15 - (Withdrawn) A Systematic Analysis of Regression Test Case Selection: A Multi-Criteria-Based Approach. 5834807:1-5834807:11

- Feng Luo

, Bowen Wang
, Zihao Fang
, Zhenyu Yang
, Yifan Jiang
:
Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci. 6902138:1-6902138:17 - (Withdrawn) Evaluation Method of the Influence of Sports Training on Physical Index Based on Deep Learning. 6924262:1-6924262:8

- Nouf S. Aldahwan

, Muhammad Sher Ramzan
:
Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA. 8134739:1-8134739:8 - Zhenyu Gao

, Jian Cao
, Xing-Wei Wang, Huayun Zhang
, Zengrong Xu
:
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time. 4587862:1-4587862:11 - Cheng Li

, Guoyin Zhang, Yan Mao, Xin Zhao:
A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks. 9975912:1-9975912:9 - Jingyi Li, Yujue Wang, Yong Ding

, Wanqing Wu, Chunhai Li
, Huiyong Wang:
A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks. 9463606:1-9463606:10 - (Withdrawn) Parallel Calculation Method of Patch Area Landscape Art Index Based on Surface Coverage Data. 9149734:1-9149734:10

- Yanli Ren

, Xianji Cai, Mingqi Hu:
Privacy-Preserving Redactable Blockchain for Internet of Things. 4485311:1-4485311:12 - Xian-wei Yang, Xueqiu Zhan

, Hongjuan Kang, Ying Luo:
Fast Software Implementation of Serial Test and Approximate Entropy Test of Binary Sequence. 1375954:1-1375954:10 - Xueying Qiu

, Yongzhuang Wei
, Samir Hodzic, Enes Pasalic:
Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo. 5310545:1-5310545:9 - (Withdrawn) Edge Location Method for Multidimensional Image Based on Edge Symmetry Algorithm. 1326357:1-1326357:11

- Rong Ma, Tao Feng

, Junli Fang:
Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT. 7776193:1-7776193:10 - (Withdrawn) An Efficient Resource and Topological Attribute-Based Configuration Algorithm of Virtual Networks. 9952793:1-9952793:13

- Ruonan Wang

, Min Luo
, Yihong Wen, Lianhai Wang, Kim-Kwang Raymond Choo
, Debiao He
:
The Applications of Blockchain in Artificial Intelligence. 6126247:1-6126247:16 - Chien-Ming Chen

, Shuangshuang Liu
:
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure. 6537678:1-6537678:13 - Muhammad Hameed Siddiqi

, Khurshed Asghar, Umar Draz
, Amjad Ali
, Madallah Alruwaili
, Yousef Alhwaiti
, Saad Awadh Alanazi
, M. M. Kamruzzaman
:
Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns. 4270776:1-4270776:10 - Dimitrios Kosmanos

, Dimitrios Karagiannis, Antonios Argyriou
, Spyros Lalis
, Leandros Maglaras
:
RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. 9959310:1-9959310:16 - Shichao Gao

, Ming Xia, Gaobo Yang
:
Dual-Tree Complex Wavelet Transform-Based Direction Correlation for Face Forgery Detection. 8661083:1-8661083:10 - Deng Zhao, Weiwei Chen

:
Design and Research of Smart Neck Helmets Based on the KANO-QFD Model and TRIZ Theory. 4693719:1-4693719:13 - (Withdrawn) Deep Reinforcement Learning-Based Algorithm for VNF-SC Deployment. 7398206:1-7398206:11

- Peng Lu

, Teng Hu
, Hao Wang
, Ruobin Zhang
, Guo Wu
:
G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network. 3566360:1-3566360:13 - Mantun Chen

, Yongjun Wang
, Zhiquan Qin
, Xiatian Zhu
:
Few-Shot Website Fingerprinting Attack with Data Augmentation. 2840289:1-2840289:13 - Yong Fang

, Mingyu Xie, Cheng Huang
:
PBDT: Python Backdoor Detection Model Based on Combined Features. 9923234:1-9923234:13 - Ruyan Wang, Shiqi Zhang

, Zhigang Yang, Puning Zhang, Dapeng Wu, Yongling Lu, Alexander A. Fedotov:
Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing. 7354316:1-7354316:12 - Jiageng Yang, Xinguo Zhang, Hui Lu

, Muhammad Shafiq
, Zhihong Tian
:
StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices. 1987844:1-1987844:15 - Taimur Bakhshi

, Bogdan Ghita
:
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning. 5363750:1-5363750:16 - (Withdrawn) An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks. 5451820:1-5451820:14

- Huaifeng Shi

, Chengsheng Pan
, Li Yang
, Xiangxiang Gu
:
AGG: A Novel Intelligent Network Traffic Prediction Method Based on Joint Attention and GCN-GRU. 7751484:1-7751484:11 - (Withdrawn) Distributed Consensus Algorithm for Nonholonomic Wheeled Mobile Robot. 7617819:1-7617819:9

- Javier Junquera-Sánchez

, Carlos Cilleruelo
, Luis de-Marcos
, José Javier Martínez-Herráiz
:
Access Control beyond Authentication. 8146553:1-8146553:11 - Rong Ma

:
Edge Server Placement for Service Offloading in Internet of Things. 5109163:1-5109163:16 - Dapeng Man

, Fanyi Zeng, Wu Yang, Miao Yu
, Jiguang Lv, Yijing Wang:
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things. 9361348:1-9361348:11 - Baozhen Yang

, Xuedong Tian
:
Multimodal Blog Sentiment Classification Based on MD-HFCE. 7457585:1-7457585:13 - Jingjing Guo

, Jiacong Sun
:
Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing. 5686506:1-5686506:17 - Xinghua Liu

, Dandan Bai, Yunling Lv, Rui Jiang
, Shuzhi Sam Ge
:
UKF-Based Vehicle Pose Estimation under Randomly Occurring Deception Attacks. 5572186:1-5572186:12 - Shinya Haga

, Kazumasa Omote
:
IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet. 8937448:1-8937448:10 - Chao Li

, Fan Li
, Lihua Yin
, Tianjie Luo
, Bin Wang
:
A Blockchain-Based IoT Cross-Domain Delegation Access Control Method. 3091104:1-3091104:11 - Amir Ali

, Zain Ul Abideen
, Kalim Ullah:
SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns' Detection. 2897565:1-2897565:14 - (Withdrawn) Some Novel Geometric Aggregation Operators of Spherical Cubic Fuzzy Information with Application. 3774353:1-3774353:14

- Chuan-Jun Yi

:
En-Route Message Authentication Scheme for Filtering False Data in WSNs. 4068507:1-4068507:18 - Hasan Alkahtani, Theyazn H. H. Aldhyani

:
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications. 3806459:1-3806459:23 - Ki Hyeon Hong

, Un Gu Kang
, Byung Mun Lee
:
Enhanced Evaluation Model of Security Strength for Passwords Using Integrated Korean and English Password Dictionaries. 3122627:1-3122627:13 - Yuanyuan Huang

, Jiazhong Lu
, Haozhe Tang
, Xiaolei Liu
:
A Hybrid Association Rule-Based Method to Detect and Classify Botnets. 1028878:1-1028878:9 - Yaoqi Yang

, Xianglin Wei
, Renhui Xu, Laixian Peng
, Yunliang Liao, Lin Ge:
Security-Oriented Indoor Robots Tracking: An Object Recognition Viewpoint. 7456552:1-7456552:9 - Yong Tian

, Sirou Li, Chen Chen, Qiyue Zhang, Chuanzhen Zhuang, Xuejun Ding
:
Small CSI Samples-Based Activity Recognition: A Deep Learning Approach Using Multidimensional Features. 5632298:1-5632298:14 - Hongyun Cai

, Fuzhi Zhang
:
An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features. 2907691:1-2907691:18 - Hua Ren, Shaozhang Niu

, Haiju Fan, Ming Li, Zhen Yue:
Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing. 6978772:1-6978772:20 - Xinliang Bi

, Xiaoyuan Yang
, Chao Wang
, Jia Liu
:
High-Capacity Image Steganography Algorithm Based on Image Style Transfer. 4179340:1-4179340:14 - Qi Xie

, Zixuan Ding
, Bin Hu
:
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. 4799223:1-4799223:12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














